PRIME and MoodlePKI José Luis Villarig García Webmaster www.lefis.org University of Zaragoza.

Slides:



Advertisements
Similar presentations
EzScoreboard.com A Fully Integrated Administration Service.
Advertisements

Using Technology to Facilitate Trade Presented by Sue Welch Chief Executive Officer CrossStreetTrade, Inc. 2 Main Street, Gloucester, MA 01930, USA.
Internet Protocol Security (IP Sec)
Table of contents 1 Manual of Operational Procedures (MOP) 2
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 15 Creating Collaborative Partnerships.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project.
An Overview. BizLink BizLink is a Social Networking platform for business. It allows colleagues to come together, ask questions, share resources, form.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
A New Computing Paradigm. Overview of Web Services Over 66 percent of respondents to a 2001 InfoWorld magazine poll agreed that "Web services are likely.
Using Digital Credentials On The World-Wide Web M. Winslett.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
Managing Client Access
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
UPU & IPS Web Established in 1874, the Universal Postal Union (UPU), with its headquarters in the Swiss capital Berne, is the second oldest international.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
November 10, 2010 Washington, D.C.. Agenda Secure Component tool Secure Component tool Contacts and Messaging Contacts and Messaging Workspaces Workspaces.
LEFIS W2 Posgraduate Workshop 1 LEFIS, WG 2 Postgraduate studies Meeting, Rotterdam.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Chapter 4 – Slide 1 Effective Communication for Colleges, 10 th ed., by Brantley & Miller, 2005© Technology and Electronic Communication.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
Module 9 Configuring Messaging Policy and Compliance.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
ELECTRONIC CONVEYANCING WORKSHOPS 2009 Simon Libbis Executive Director Ann Kinnear Operations Manager.
Purchase decision-making research based on online transaction credit risk evaluation by zhao kunpeng xjtu 28/8.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
MEDIU Learning for HE Ahmad Nimer | Project Manager.
COMP1321 Networks in Organisations Richard Henson March 2014.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
1 European eGovernment Awards 2007 European eGovernment Awards 2007 Workshop for Finalists July, Brussels LIMOSA Belgium Reference project number.
Universidad de Zaragoza LEFIS General Assembly Firenze February 2006 LEFIS - APTICE: Legal Framework for the Information Society II The LEFIS Network:
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
LEFIS Steering Committee Meeting Brussels, 11th November 2005 SOCRATES PROGRAMME ERASMUS - Thematic Network projects LEFIS - APTICE: Legal Framework for.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Brenda Watkins Director Policy and Business Strategies Information.
DIGITAL SIGNATURE.
The LEFIS UNIZAR PKI as a Case of Identification Management at a Regional Level.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Stamp of Quality: AGACE Pilar Lasala, APTICE LEFIS Quality Sofia, 2 nd -3 rd June 2006.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 15 Creating Collaborative Partnerships.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Eurostat Sharing data validation services Item 5.1 of the agenda.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
COMPUTER STUDIES Introduction. What is Computer Studies?  Many workplaces today utilise computers competencies  When applying for employment you may.
1 Usability Analysis n Why Analyze n Types of Usability Analysis n Human Subjects Research n Project 3: Heuristic Evaluation.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
The FederID project The First Identity Management and Federation Free Software.
Internet Business Associate v2.0
Student Privacy in an Ever-Changing Digital World
SISAI STATISTICAL INFORMATION SYSTEMS ARCHITECTURE AND INTEGRATION
Introduction to Networks
ESS VIP ICT Project Task Force Meeting 5-6 March 2013.
Electronic TIR pre-declaration
Presentation transcript:

PRIME and MoodlePKI José Luis Villarig García Webmaster University of Zaragoza

Presentation PRIME: European project to create an Identity Management System and provide guides for developers to follow its philosophy. Moodle: CMS, documents management and online courses management.Moodle MoodlePKI: Moodle extension developed for which joins Moodle with PKI tecnologies. –Objective: to make MoodlePKI follow PRIME philosophy and directives.

PRIME: Index PRIME –The Information Society –Risks in the IS –Can technologies help?: PRIME –PRIME The user The services provider The project Current state

The Information Society IT is improving services: –space, time ↓ => cost, energy, waste ↓ Technology has a huge potential to offer personalized and contextual services, which can bring more benefits in terms of convenience, effectiveness and efficiency. This depends on quality and availability of personal information to service providers –Importance of the right to privacy.

Risks in the IS Cost is no longer a major barrier to the collection of personal information => commonplace practice. –In the real world, we decide what information to give and when. Personal data are analysed to profile people and offer more personalized offers to gain a competitive edge. Risks: –Loss in privacy –SPAM –“Bad clients” lists. –SCAMs, frauds, phishing –Respect laws: Data protection, E-Commerce Directive...

Can technologies help?: PRIME There are lots of solutions for the problems or their consequences: –PKI systems. –Firewalls –Antivirus –… However, very few of them show users which data they are sending: that is PRIME’s principal focus.

PRIME: the user User-controlled identity management system where all the players concerned act together, mediated by technology to enforce the rules set by law and the contracting partners. The user has control of personal information and negotiates its disclosure in return for access to a service  agreement between the user and the service provider whereby the provider collects personal data for a stated purpose (which may include transmission of these data to other actors). All act within the bounds of law and the agreed terms between them. The PRIME project wants to create a prototype where the preceeding is made in every context. –Middleware.

PRIME: The service providers The service providers are fitted with appropiate counterparts of the user’s digital assistant integrated with their infrastructure: applications, databases, privacy policies, etc. Ensuring fulfillment of the agreement: –Gives users access to their disclosed data. –Facilitates dispute resolution. –Enables transfer of personal data on behalf of the individuals, with their consent, to other providers. –Enables the providers to negotiate agreements between themselves in strict compliance with the original agreement made with the user.

THE PRIME project The PRIME Consortium consists of 20 member organisations from industry (IBM, HP, Swisscom), universities (Milano, Kastadst), research centres and data protection. It receives a research funding of about 13M euros from the European Union's Sixth Framework Programme and the Swiss Federal Office for Education and Science. Its main purpose is developing the PRIME software mentioned before. Partial prototypes in some scenarios: E-Learning Pharmacy Finder Airport Security –Its developing is private. Only public videos can be found on PRIME webpage. –They are only small “aproximations” to PRIME final objective.

PRIME: actual state There aren’t PRIME prototypes Only partial and “close” developings in initial fase. PRIME has stated the basics and philosophy for the developing of the prototype => what requisites a IMS should comply, according to PRIME. A lot of tutorials and documents constating the importance of security and privacy and how to ensure it. More information:

Moodle and MoodlePKI: Index What is Moodle? Why Moodle on What MoodlePKI is System Design –Presentation modifications –Redirection –Authentification component –User accounts Future tasks

Moodle Moodle is: –A CMS, Content Management System –Online curses creation –Documentation Management System. Moodle web:

Why Moodle on Main requisites observed on 2003 for –Public part, which offers on Internet information about the project. –Needed a private workspace and a private contents part. –The private workspace should allow the project members to make their tasks, provide access to information and to project results. –Accesibility: Only a web browser should be needed. –Security requeriments. This requisites are only concrete cases of using CMS, groupware, process management…

MoodlePKI MoodlePKI is a project about security in information systems based on PKI which allows Moodle to respect the most exigent security standards. Initial application in In a place like Moodle, garanties can be needed about users identification, privacy, document vality, etc.  Providing Moodle with PKI techniques like: –Users identification and access control using digital certificates. –Electronic firm operations for sending documents. –Ensure security on communications –Using a encriptation system. –Electronic firm to ensure validation of the system objects (ie. documents, messages and forum posts). It can be made using PKI infraestructures and free software.

System Design Presentation modifications Design criteriums about aspect and posibilities of structure and organization of the graphical aspect of Moodle. These modifications (most of them about organization) changes the use and aspect of Moodle blocks and add other components. Redirection The user connects to In some moment, when the user attempts to access a protected content (for example, adding posts on news), Moodle calls to /login/index.php using HTTPwww.lefis.org /login/index.php has been modified to call an specific component for authentification tasks, making this authentification by https.

System Design 2: Authentification component After making a HTTPS connection, the user’s browser is forced to show the digital certificates stored: –It varies depending on the browser’s configuration. The authentification service obtains the certificate as a parameter of the secure connection. The web service that validates certificates and returns control information to Moodle works simultaneusly with digital certificates issued by different CA if we identify them as valid: –Spanish “Fábrica Nacional de Moneda y Timbre” certificates recognition is now on test phase.

System Design 3: User accounts A new user in the system meant a new PKI user, a new entry in the lefis database and a new moodle account  the information was replicated in three databases. The three databases are necesary. The key used to identify people and which allows to associate OpenCA accounts which Moodle ones is “ ”. Moodle applications for changing user data will be still there. –A task for the future will be that those modifications are made to the lefis database also so that Moodle’s database will at all time have congruent data with lefis database. When a user without a moodle account but with certificate and an entry on the lefis database enters the system, a new moodle account is made automatically in a transparent way. Error cases analized and solved: –No certificate givenNo certificate given –Bad certificateBad certificate –...

MoodlePKI future tasks Report generation Digital library system Complete integration of lefis database with moodle Workspaces for the WG. Exporting MoodlePKI as a module: –MoodlePKI is not yet an independent module. –We plan to improve it and make a module that can be used in other situations. MoodlePKI and PRIME –Without a PRIME prototype it is almost impossible to know how MoodlePKI will integrate with the PRIME solution. –However, some of the PRIME guides are present in MoodlePKI and our objective is to continue that path (for example, informing the user with detail of the use of all their data. Final security revision. … Other tasks to be foreseen.